click to show more information

click to hide/show information About your Search

20130416
20130424
Search Results 0 to 6 of about 7 (some duplicates have been removed)
and can only respond to known threats. cyberthreats evolve at the speefed technology and this measure helps the private sector protect against cyberattacks by providing companies with the latest cyberthreat information from the intelligence community which has timely classified information about destructive malware. this cyberthreat intelligence is the information that companies and the government need to protect and defend their networks. the so-called signatures are primarily made up of numerical codes consisting of zeros and ones without any perm information attached. -- any personal information atammed. cispa is a result of cooperation between the community, companies and to a certain degree the white house as it pertains to many measures included in this legislation. during their efforts to improve the bill, they also maintain a dialogue with privacy advocates in an effort to strengthen civil liberties, protections and oversights. i had a personal note here for the reason that over a period of 10 years i served eight of those years on the intelligence committee. and the now chair
and the military side. i've constantly tried to improve how we address the need for the next generation technology, public-private cooperation and ensuring that we have the price personnel to counter this 21st century cyberthreat. however, i am uncompromising in safeguarding the rights of our citizens and i will never sacrifice our civil liberties for unneeded intrusion. to this end, the amendment i am offering today would strengthen existing provisions in the bill to include the privacy officer and the officer for civil rights and civil liberties of the department of homeland security askey stakeholders in the report that would a-- as key stakeholders in the report. this report would assess how this legislation affected our civil liberties and privacy throughout our federal government, and the department of homeland security is the -- the key civil department in our federal government that develops and implements cybersecurity protocalls for the rest of the -- protocols for the rest of the federal government. it is crucial that they be part of any assessment and work with both the privacy office
that could be bigger than what you already have and we all know that with technology you can get more out of the old fields, but this is brand new stuff. >> well, what we are doing is the wise seismics that we have been doing -- >> what? >> wise athemmic seismic, and we have done it on the shelf, and we have joined with apache on some of the fields and you look for the big discoveries under salt. you think about this, if you want to hide a big oil under it is under salt. >> how deep? >> 15,000 to 20,000 are the primary targets. >> when you talk about, you are not a huge oil company, but this is the kind of thing that i would expect a huge oil company to do, and if we have things like happened with nick moran where, or davie jones to hit some dry holes how could you be put in a damaging position by this kind of thing? >> well, the wells that we are drilling are $30 million or $40 million, and we have 30%, and the one exxon is $30 million and done the first two, and the risk/reward is high and the reason they are there and while they are good sizes for us, 30 to 50 million barrel opportunit
shows in terms of sales volume, and we all know how we're using our technology more and more every day for our personal lives and how we defend on it. for example, the national shooting sports foundation surveyed owners of modern sporting rifles in 2010 and found that 10% of them, 10% of all rifles sold had purchased their firearms at gun shows, whereas 25% had purchased them online. 25%. believe me, i understand the political stakes for my colleagues and i sympathize. i have been there. i understand it. and comes from states like west virginia, and no state has a higher regard for the second amendment rights to bear arms than my state. in fact, on the great seal of the state of west virginia, the preamble is montani sember liberai. in latin, that means mountaineers are always free. you know how we feel. one of the review states that became a state during the civil war, broke away from virginia at that time. but west virginians are also guided by a little common sense. i have said this. in west virginia, we know what nonsense is, we know what common sense is, and now we know what gun s
records are prime targets for attackers to steal. according to the information technology industry council, 18 adults become victims to cybercrime, including identity campaigns ishing every second. this adds up to 1 1/2 million cybercrime victims each day. cyberattacks present a very real and dangerous threat to the united states, however the government currently
the door for this, but this is why i answer the way i did that i see that with the technology goings way it is and with drone technology advancing and drones getting smaller and smaller, they are not going to the the giant, big predators flying over pakistan, but little small drones to be armed with things. this is not science fiction here in terms of this is actually happening. >> booktv on location on the campus of the university of southern california at the l.a. times festival of books talking with mark mazzetti, "new york times" national security correspondent and author of this book, "the way of the knife," and, jim, you're the next caller from idaho. hi, jim. >> caller: good afternoon, gentlemen. i have a question. the la proider of servicee of to the war department in afghanistan, and i asked how the afghans were going, and i quoted him in the remark right now saying that it's basically a total failure. he went into details about that aspect of what basic means. what do you think the result is basically in afghanistan? >> well, it's obviously a question on a lot of people's mind.
Search Results 0 to 6 of about 7 (some duplicates have been removed)